메뉴 건너뛰기




Volumn 2, Issue 2, 1990, Pages 63-76

A discrete logarithm implementation of perfect zero-knowledge blobs

Author keywords

Cryptographic protocols; Zero knowledge proof systems

Indexed keywords

MATHEMATICAL TECHNIQUES--NUMBER THEORY;

EID: 0025056443     PISSN: 09332790     EISSN: 14321378     Source Type: Journal    
DOI: 10.1007/BF00204448     Document Type: Article
Times cited : (48)

References (24)
  • 1
    • 84934219855 scopus 로고    scopus 로고
    • L. Adleman and M. Huang. Recognizing primes in random polynomial time. In Proceedings of the 19th Annual ACM Symposium on the Theory of Computing, pages 462–469, 1987.
  • 2
    • 84934219856 scopus 로고    scopus 로고
    • L. Babai. Trading group theory for randomness. In Proceedings of the 17th Annual ACM Symposium on the Theory of Computing, pages 421–429, 1985.
  • 3
    • 84934219857 scopus 로고    scopus 로고
    • E. Bach. Discrete logarithms and factoring. Technical Report 84/186, Computer Science Division, University of California, June 1984.
  • 5
    • 84934219880 scopus 로고    scopus 로고
    • M. Ben-Or, S. Goldwasser, and A. Widgerson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proceedings of the 20th Annual ACM Symposium on Theory of Computing, pages 1–10, 1988.
  • 9
    • 84934219881 scopus 로고    scopus 로고
    • G. Brassard and D. Chaum. Personal communication, 1987.
  • 11
    • 84934219878 scopus 로고    scopus 로고
    • G. Brassard and C. Crépeau. Nontransitive transfer of confidence: a perfect zero-knowledge interactive protocol for Sat and beyond. In Proceedings of the 27th IEEE Symposium on the Foundations of Computer Science, pages 188–195, 1986.
  • 13
    • 84934219879 scopus 로고    scopus 로고
    • D. Chaum. Demonstrating that a public predicate can be satisfied without revealing any information about how. In Crypto 86, pages 195–199, 1986.
  • 14
    • 84934219876 scopus 로고    scopus 로고
    • D. Chaum, C. Crépeau, and I. Damgård. Multiparty unconditionally secure protocols. In Proceedings of the 20th Annual ACM Symposium on Theory of Computing, pages 11–19, 1988.
  • 15
    • 84934219877 scopus 로고    scopus 로고
    • D. Chaum, I. Damgård, and J. van de Graaf. Multiparty computations ensuring privacy of each party's input and correctness of the result. In Crypto 87, pages 87–119, 1987.
  • 16
    • 84934219884 scopus 로고    scopus 로고
    • D. Chaum, J.-H. Evertse, and J. van de Graaf. An improved protocol for demonstrating possession of a discrete logarithm and some generalizations. In Euro Crypt 87, pages 127–141, 1987.
  • 17
    • 84934219885 scopus 로고    scopus 로고
    • L. Fortnow. The complexity of perfect zero-knowledge. In Proceedings of the 19th Annual ACM Symposium on the Theory of Computing, pages 204–209, 1987.
  • 19
    • 84934219882 scopus 로고    scopus 로고
    • O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design. In Proceedings of the 27th IEEE Symposium on the Foundations of Computer Science, pages 174–187, 1986.
  • 20
    • 84934219883 scopus 로고    scopus 로고
    • S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof-systems. In Proceedings of the 17th Annual ACM Symposium on the Theory of Computing, pages 291–304, 1985.
  • 24
    • 84934219870 scopus 로고    scopus 로고
    • A. Yao. Theory and applications of trapdoor functions. In Proceedings of the 23rd IEEE Symposium on the Foundations of Computer Science, pages 80–91, 1982.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.